wh0amitz/KRBUACBypass

UAC Bypass By Abusing Kerberos Tickets

C#windowsinfoseckerberosuac-bypassredteamredteam-tools
This is stars and forks stats for /wh0amitz/KRBUACBypass repository. As of 03 May, 2024 this repository has 403 stars and 53 forks.

Background This POC is inspired by James Forshaw (@tiraniddo) shared at BlackHat USA 2022 titled “Taking Kerberos To The Next Level ” topic, he shared a Demo of abusing Kerberos tickets to achieve UAC bypass. By adding a KERB-AD-RESTRICTION-ENTRY to the service ticket, but filling in a fake MachineID, we can easily bypass UAC and gain SYSTEM privileges by accessing the SCM to create a system service. James Forshaw explained the rationale behind this in a blog post called "Bypassing UAC in the most...
Read on GithubGithub Stats Page
repotechsstarsweeklyforksweekly
sdcb/Sdcb.ArithmeticC#1130110
LordNoteworthy/windows-exploitationC++CPython1600340
DawnosaurDev/platformer-movementShaderLabC#HLSL2450990
PeterDaveHello/chkdomainShellMakefile570130
Rectify11/InstallerC#1.4k01170
Raphire/Win11DebloatPowerShellBatchfile1.2k0540
lyqilo/ClientConfigSmartyC#Other0000
noio/games.noio.planterC#1870150
Razzmatazzz/RemnantSaveGuardianC#1420220
wh0amitz/S4UTomatoC#324+962+4